OSINT, Part 3: Extracting Employee Names from Companies (Tesla and Breitbart) on LinkedIn

Welcome back, my aspiring cyber warriors! The Internet is the deepest and widest data repository in the history of the world! Those who can extract and cultivate intelligence from it, will be empowered like none other! This data can be used for offensive security and forensic investigations, among many other applications. Crosslinked is one more […]

Continue Reading

Snort Basics for Hackers, Part 6: Configuring Snort to Detect the SolarWinds/Sunburst Backdoor

Welcome back, my aspiring cyberwarriors! In recent weeks I’m certain you have heard about the SolarWinds/Sunburst hack. Just to review, Russian state-sponsored actors hacked into the SolarWinds update server and installed malware into the software updates. As a result, everyone who received the March 2020 update, now has a Russian backdoor on their system. This […]

Continue Reading